JavaScript With Statement Explained – A Deep Dive

photo 1529156069898 49953e39b3ac

JavaScript’s built-in with statement specifies the default object for the given property and gives us a shorthand for writing long object references. More precisely, it adds the given object to the head of the scope chain. Note: Use of the with statement is discouraged. It can lead to strange bugs. That said, it’s important to …

Read more

JavaScript Map Function Explained – A Deep Dive

photo 1502209524164 acea936639a2

The built-in JavaScript map function returns a new array, where each element in the new array is the result of the corresponding element in the old array after being passed through a callback function. Later in the article, we’ll do a deep dive into some more advanced concepts regarding the map function and its uses. …

Read more

BitBanged SPI in Go, An Explanation

1 5WD0gV6autEIzv8GMkc5gQ

I’m going to focus mostly on some design decisions and also how I went about writing an SPI interface using Go on a Raspberry Pi. I assume my readers have a basic understanding of what a Raspberry Pi is, and how basic electronics work. If not, read on anyway and I will be sure to …

Read more

Top 8 Online Crypto Communities 2021

people at a concert scaled

Crypto has been explosive in 2020, and while the hype train has somewhat left the station, we are sure it will be back. In the meantime, it’s a good opportunity to learn more about the technology that supports decentralized money. These communities can help tremendously. #1 BITCOINTALK Bitcointalk is undoubtedly the gold standard for the …

Read more

Top 6 Golang Logging Best Practices

guest writing on table

Let’s discuss a few rules of thumb for logging in Go, as well as some features you may not have heard of that can make debugging easier. Best practices for logging in Go are not so obvious and sometimes we need to look closer to see what is the best choice, considering the unique situation …

Read more

Cryptography Trends And News Going Into 2020

photo 1536242918817 db5e93c7a0e4

Quantum Computing Quantum computing may not be coming quite as fast as some in the field had certainly feared (or perhaps hoped). Google did, however, solve an impressive problem this year. They published a paper in Nature. It stated that their quantum processor solved a problem that, in contrast, a digital computer would take 10,000 …

Read more

Intro to The AES-256 Cipher

1 Th9nPlIhYveMMsG9RvqQsQ

AES, or “Advanced Encryption Standard”, is an encryption specification that uses the Rijndael cipher as its symmetric key ciphering algorithm. AES encrypts a message with a private key, and no one but the key holder can decrypt the message. A great example of a good use-case for AES-256 is encrypting all the data on the …

Read more

(Very) Basic Intro to Hash Functions (SHA-256, MD5, etc)

Hash functions are used to securely store passwords, find duplicate records, quickly store and retrieve data, among other useful computational tasks. As a practical example, all user passwords on Qvault are hashed using Bcrypt to ensure that if an attacker were ever to gain access to our database our user’s passwords wouldn’t be compromised. I …

Read more

Basic Intro to Key Derivation Functions

photo 1553386323 60698d6f7325

A Key Derivation Function, or KDF, derives one or more secret keys from a secret value. If you’ve ever needed to store a password in a database or create a private key from a password, you may have used a KDF. Some examples of popular KDFs are Argon2, Scrypt, and PBKDF2. Are KDFs Just Hash …

Read more

Cryptology vs Cryptography – Definitions and Differences

e2ccd365950e1e853a2c3a4f27d8b92c

Many new developers are jumping right into writing code, usually for those fat paychecks, without learning much about the history of Computer Science. Alan Turing is recognized as the father of Computer Science, though many don’t know that his roots were in cryptology and methematics. It was out of cryptology, cryptography, and mathematics that computer …

Read more